-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[QA] 2.0.0 Testplan #132
Comments
@michaelstingl @jesmrec please fill in details where possible. |
i added the link to the OIDC test plan i used to execute. Do you need more details there? I will add dynamic registration test cases as soon as i start with it. |
Changlog Testplan
|
Dynamic client registration with owncloud-2.7.0-daily20210127 (win10) Tested against a server installation, where kopano has a konnectd-identifier-registration.yaml with an invalid entry
and openidconnect-1.0.0 is running.
The client user can login and syncing works fine. It is a surprise to see that in openidconnect-1.0.0 already. It was expected to not work in 1.0.0 and only work in 2.0.0 Files with the correct id and secret (unaffected by the above XXXXX):
files showing the XXXX Modification:
After patching all three files to have XXXXX, and after restarting the kopano service via docker-compose stop/up, client-2.8 can still connect. |
Logfile excerpts output from client 2.8 daily 20210127, linebreaks added for readability via
@TheOneRing The client remains connected and is happily syncing. |
Well the first is the response in which we got the new client id after the registrations. |
Should the dynamic client ID also refresh itself ater some time? Or is this infinitly valid? |
It times out, the response returning the id also provides client_secret_expires_at |
Tests successful wrt to openidconnect--2.0.0 - client issues pending. |
Setup
Setup details (click to view)
Automated setup script: https://github.com/owncloud-docker/compose-playground/blob/master/examples/hetzner-deploy/make_openidconnect_test.sh
References:
Testplan
openidconnect-1.0.0 Web UI + desktop client 2.7.5RC2
occ app:enable openidconnect
occ upgrade
is needed. #1352. Enter correct credentials
2. In iDP, cancel login process
2. Logout in the idP
openid-configuration
requestregister
endpoint availableregister
endpoint is requestedlogon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizing/signin/v1/identifier
/signin/v1/consent
http://localhost:44155/
logon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizing using client id and secret id granted by register endpointtoken
endoint is requested with refresh token to get a new token. This must be transparent for the client01-22 09:21:03:624 [ info sync.credentials.http ]: Refreshing token
01-22 09:21:03:759 [ info sync.httplogger ]: ... Request: POST ... /konnect/v1/token
2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
2. Enable maintenance mode and upgrade to OIDC
3. add
'token_auth_enforced' => true
to config.php4. Disable maintenance mode
Server replied "599"
after 30 sec.2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
2. Enable maintenance mode and upgrade to OIDC, keeping Oauth2 enabled
3. Disable maintenance mode
Android
After releasing 2.16, authentication library will be replaced for a custom implementation. Tests here will be done with such implementation as well
Actually, Android does not support Dynamic Client Registration yet.
Openidconnect: 2.0.0RC1
Device: Google Pixel 2
Android version: 11
New: ✅
2. Enter correct credentials
New: ✅
New: ✅
2. In iDP, cancel login process
New: ✅
2. Logout in the idP
openid-configuration
requestNew: ✅
register
endpoint availableregister
endpoint is requestedlogon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizingNew: ✅
logon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizing using client id and secret id granted by register endpointNew: ✅
token
endoint is requested with refresh token to get a new token. This must be transparent for the clientNew: ✅
2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
4. Force re-login
New: ✅
2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
New ✅
2. Enable maintenance mode and upgrade to OIDC, keeping Oauth2 enabled
3. Disable maintenance mode
New: ✅
Smoke test: 2.16 ✅ New ✅
iOS
Openidconnect: 2.0.0RC1
Device: iPhoneXR
iOS version: 14.2
Tested with the current stable
11.4.5
and the new one 11.5, including Dynamic Client Registration11.5 ✅
2. Enter correct credentials
11.5 ✅
11.5 ✅
2. In iDP, cancel login process
11.5 ✅
2. Logout in the idP
openid-configuration
request11.5 ✅
register
endpoint availableregister
endpoint is requested11.5 ✅
logon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizing11.5 ✅
logon
endpoint is requested after entering credentialsThe
authorize
endpoint is requested after authorizing using client id and secret id granted by register endpoint11.5 ✅
11.5 ✅
token
endpoint is requested with refresh token to get a new token. This must be transparent for the client11.5 ✅
11.5 ❌
2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
4. Force re-login
2. Enable maintenance mode and upgrade to OIDC
3. Disable maintenance mode
11.5 ✅
2. Enable maintenance mode and upgrade to OIDC, keeping Oauth2 enabled
3. Disable maintenance mode
11.5 ❌
Smoke test: 11.4 ✅ 11.5 ✅
The text was updated successfully, but these errors were encountered: